Introduction: In the rapidly developing landscape of digital technologies, Artificial Intelligence (AI) emerges as both a marvel and a challenge for organisations across various sectors. It automates mundane tasks and drives data-driven decisions, revolutionising how businesses operate. However, as we use AI to streamline operations and enhance security measures, we must also examine its role […]
Author: Lucas Seewald
The Top 7 Insider Threats Every Company Should Be Aware Of
Understanding the top insider threats from within In today’s volatile and interconnected world, safeguarding a company’s assets is not just about fending off external cyber-attacks and physical breaches. However, an often overlooked risk comes from within — the insiders. According to industry reports and research, insider threats represent a significant proportion of all security incidents. […]
The Psychological Underpinnings of Insider Risk
Understanding Your Threat from Within In today’s interconnected world, businesses face numerous challenges in protecting their valuable assets. Whilst external threats like cyber-attacks and physical breaches often dominate the headlines, one area that deserves equal attention is the risk posed by the beating heart of organisations: their workforce. The psychology of insider risk delves into […]
Insider Risk in the Shipping Industry
Introduction The shipping industry serves as the backbone of international trade, responsible for transporting over 90% of the world’s goods. Despite its critical role, the industry is plagued by an array of insider risks including corruption, cybercrime, and workplace violence. The gargantuan seizure of more than 8,000 kilos of cocaine at the Rotterdam port in August 2023, […]
Insider Threat Awareness Month: The Crucial Role of Bystander Engagement
Introducing: Insider Threat Awareness Month September marks the annual National Insider Threat Awareness Month (NITAM). NITAM is a campaign that aims to educate both government and industry about the risks posed by insider threats. Initiated in 2019, NITAM has grown to become a global campaign, involving thousands of security professionals and policymakers from 25 countries. This year, […]
The British Museum Theft: A Spotlight on Physical Insider Risks
The recent theft at the British Museum has sent shockwaves through the cultural and security communities alike. While the loss of invaluable artefacts is devastating, the incident serves as a poignant reminder that insider risks are not confined to the digital realm. They can manifest in the theft of physical assets, tarnishing an organisation’s reputation and causing […]
Navigating Internal Threats: Understanding and Mitigating Rogue and Spying Employees
In the complex landscape of cybersecurity, the threat often comes from outside the organisation. However, an internal threat known as “Rogue Employees” can be equally, if not more, damaging. With the rise of personal devices in the workplace and the temptation to bypass cybersecurity protocols, understanding the nature of a rogue employee and implementing strategies […]
Academic Espionage: Safeguarding the Halls of Knowledge from Insider Risks
Universities, revered as hubs of knowledge and innovation, play a pivotal role in facilitating groundbreaking innovation across diverse disciplines. However, behind the tranquil facade of academia lies a clandestine domain of secrecy. Presently, Western universities grapple with an escalating challenge— academic espionage. These esteemed institutions have become alluring targets for foreign actors seeking to engage […]
Insider Risk in the Defence Sector
Introduction The defence sector, vital to national security, is increasingly becoming a hotspot for insider risks. With a diverse array of entities, from large contractors to SMEs, and an intricate supply chain, the sector is an attractive target for both internal and external actors. Insider risks in the defence sector have resulted in significant information […]
Understanding Cybersecurity and Its Importance in Managing Insider Risks
Cybersecurity is the practice of safeguarding systems, networks, and programmes from digital attacks. These cyberattacks are often aimed at accessing, changing, or destroying sensitive information, extorting money from users, or disrupting normal business processes. The implementation of effective cybersecurity measures is a challenging task in today’s world, given the increasing number of devices and the […]